Research and information: general > Information theory

Vis mig kun

Terrorism Informatics

Terrorism Informatics

Ganor, Boaz

948,41 DKK

Communications and Multimedia Security Issues of the New Century

Communications and Multimedia Security Issues of the New Century

Steinebach, Martin

2190,77 DKK

Global Initiatives to Secure Cyberspace

Global Initiatives to Secure Cyberspace

Goodman, Seymour

875,33 DKK

Advances in Digital Forensics

Advances in Digital Forensics

Shenoi, Sujeet

875,33 DKK

Advanced Intelligent Environments

Advanced Intelligent Environments

Kameas, Achilles

1240,73 DKK

Advances in Information Systems Research, Education and Practice

Advances in Information Systems Research, Education and Practice

Roode, Dewald

875,33 DKK

Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications

Zhou, Jianying

875,33 DKK

Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing

Wagealla, Waleed

875,33 DKK

Optical Communication Theory and Techniques

Optical Communication Theory and Techniques

Forestieri, Enrico

1240,73 DKK

Identifying Malicious Code Through Reverse Engineering

Identifying Malicious Code Through Reverse Engineering

Singh, Abhishek

875,33 DKK

Performance Evaluation and Applications of ATM Networks

Performance Evaluation and Applications of ATM Networks

Kouvatsos, Demetres D.

2190,77 DKK

Performance Enhancements in a Frequency Hopping GSM Network

Performance Enhancements in a Frequency Hopping GSM Network

Wigard, Jeroen

1240,73 DKK

Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Watson, Anthony

2190,77 DKK

Computer Viruses and Malware

Computer Viruses and Malware

Aycock, John

1021,49 DKK

Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key Cryptography

Yan, Song Y.

1240,73 DKK

Large Deviations For Performance Analysis

Large Deviations For Performance Analysis

Shwartz, Adam

403,64 DKK

Critical Infrastructure Protection II

Critical Infrastructure Protection II

Shenoi, Sujeet

875,33 DKK

Usability

Usability

Wesson, Janet

875,33 DKK

Foundations of Dependable Computing

Foundations of Dependable Computing

Lau, Clifford G.

1240,73 DKK

Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing (OLAP)

Wijesekera, Duminda

875,33 DKK

Intelligence and Security Informatics for International Security

Intelligence and Security Informatics for International Security

Chen, Hsinchun

1313,81 DKK

Intelligence in Networks

Intelligence in Networks

Wuwongse, Vilas

2190,77 DKK

Online Business Security Systems

Online Business Security Systems

Williams, Godfried B.

436,85 DKK

Algebraic Aspects of the Advanced Encryption Standard

Algebraic Aspects of the Advanced Encryption Standard

Robshaw, Matthew

875,33 DKK

Security for Telecommunications Networks

Security for Telecommunications Networks

Porta, Thomas La

692,63 DKK

Information Criteria and Statistical Modeling

Information Criteria and Statistical Modeling

Kitagawa, Genshiro

875,33 DKK

Access Control Systems

Access Control Systems

Benantar, Messaoud

875,33 DKK

Securing Biometrics Applications

Securing Biometrics Applications

Crosier, Stephen

875,33 DKK

Security in E-Learning

Security in E-Learning

Weippl, Edgar R.

875,33 DKK

Impacts and Risk Assessment of Technology for Internet Security

Impacts and Risk Assessment of Technology for Internet Security

Shoniregun, Charles A.

875,33 DKK